seems wrong. I work at an international SOC with a ton of clients and after we set up edr playbooks and firewall rules, we basically just close the occasional incident that made its way through by adding it to blocklist also. We rarely have any indicents we actually need to investigate. Occasionally reverse engineer weird files, but typically false positives or just horribly written malware some bot dropped from c2 server.
@@joelanzo this could be true in certain ways. for example, c2 servers could be scanning for vulnerabilities or automatically attempting low hanging exploits more frequently, and there's never been a shortage of skids trying to exploit sites, but cyber crime as it pertains to persistent threat actors worth noting surely can't be increasing in any practical capacity.
@@shareb1t Every tech company is laying off people left and right because they over hired during the post covid time in 2021. With the rising rates of the last two years - it has caused tech companies to squirm financially a bit since most are propped up by cheap loan rates (either by banks or VC).
Ryan, it aint really safe to spill out this kind of info. you're a sysadmin at pan**** group mate! . Im not a creep, i just wanted to show how easy it is to get all sort of info about a person :)
they can't because of encryption ... thats why they are trying to ban encryption rignt now .. the crackdiwn is now for the last month if you lookup the news surrounding this youll see encryption might become illegal
Hello John, I've tried it but it seems like I cannot access the leaksdb using the API: {"error":{"code":"FORBIDDEN","message":"You don't have permission to access the resource."}}. the scope is "scopes":["firework","authenticated"] I think I should have leaksdb also but I don't know how to do it...do you have any idea? thank you
ahaha john saying "Is genesis still dead?" knowing well it is,but also wanting to showcase the "WEBSITE HAS BEEN SEIZED and "FBI" to dissuade any of beginners to get involved to cybercrime is really funny
I saw you on another channel. I wanted to see what you do. P gave you a great recommendation. You are awesome. Do not understand most of it, but enjoyed.
Thank you Mr. Hammond. Im getting into cybersec now., so.i will be all ober your channel. Nice to see some of these lesser seen exploits and private groups
"Do you think that MacBook Pro is suitable for students majoring in cybersecurity? I am about to start studying this major in university and I want to know your opinion on whether this device meets the needs of students in this field.
Is this a legit question? Let's pretend that it is. That all depends on what you plan on doing with said MacBook Pro. Taking notes? Checking emails? Watching UA-cam vids while watching virtual lectures? Playing games on Steam? Running a VM with Windows 11 on it? Of course if you're "LeEt" you'll have a Kali Linux VM too. If you need more resources you can always upgrade.... Oops, Apple, nvm. Should be fine.
Uh not many things you'll be doing in cyber-security will not require huge computer hardware resources... honestly learning s lot of cyber-sec you should be learning Linux, like kali or Parrot, or a more normal linux OS and install the tools you need. You can install linux on even kinda old laptops and it should run smooth and fast. Maybe running VMs might need good RAM because you'll be splitting up your laptop's resources to run multiple machines. and maybe if you're bruteforcing thru big lists of hashes... but most cyber-sec stuff doesnt need lotsa power. Ive been learning for a couple years on an old mid-tier laptop. Good internet speed is good.
honestly yes. they use zsh shell by default, and a lot of bsd utilities which will translate well over to linux distros you may use in the fufure (kali also uses zsh by default). No substitute for learning gnu utils on a linux vm though. Mac has a few decent vm softwares now, even for m1 chips. Also, a lot of tools you'll use are available with brew, so super easy to install them with out launching a vm.
so funny ur feeling exposing undergrpound groups but you know what ur promoting thier groups so now extra people will join in that groups so dont promote any bad things to public bro hide it
1:44 credentials revealed.
lmao
they want YOU to log in and leave your IP address there
Delete this comment now.
@@fluffsquirrel why?
Don't worry, I'm sure he is changing his passwords every week.
Can you please do more of this. Maybe even a live stream just going deeper and deeper into the rabbit hole
cyber crime is sky-rocketing meaning there is so much for cyber security professionals out there
seems wrong. I work at an international SOC with a ton of clients and after we set up edr playbooks and firewall rules, we basically just close the occasional incident that made its way through by adding it to blocklist also. We rarely have any indicents we actually need to investigate. Occasionally reverse engineer weird files, but typically false positives or just horribly written malware some bot dropped from c2 server.
On the contrary, my research shows me that surely, cyber crime is on the rise
@@joelanzo this could be true in certain ways. for example, c2 servers could be scanning for vulnerabilities or automatically attempting low hanging exploits more frequently, and there's never been a shortage of skids trying to exploit sites, but cyber crime as it pertains to persistent threat actors worth noting surely can't be increasing in any practical capacity.
yep yep
@@shareb1t Every tech company is laying off people left and right because they over hired during the post covid time in 2021. With the rising rates of the last two years - it has caused tech companies to squirm financially a bit since most are propped up by cheap loan rates (either by banks or VC).
those are mostly scams
In 2012ish almost everything was real from card shops to bot shops even the expensive exploit kits like orange pack sad if it’s not the same
For me it's kinda annoying to receive DMs from scammers on a frequent way
Some are some aren't, if you know where to look it's around 50/50
All of them are scam
@@linear_pubdef not 50/50 lol someone gotta put u on
When you referenced Okta, I panicked lol we use this as an internal MFA process and I thought we were doomed for a moment lol
same xD
Thanks for letting us know what your organization uses so someone can dive deeper and exploit it on the internet :)
Ryan, it aint really safe to spill out this kind of info. you're a sysadmin at pan**** group mate! . Im not a creep, i just wanted to show how easy it is to get all sort of info about a person :)
@@Mitra57 bro what?? okta is known for their mfa solutions. the fact that they use one internally is nothing interesting
@@Mitra57at least i wasnt the only one thinking that... Ive got research to do.
Thank you for this video, spared no expense!
Is there something like Flare but for personal use rather than company use?
Ye, it would be fine to know that
US feds run half of these lol I expect some crack down within a few years
they can't because of encryption ... thats why they are trying to ban encryption rignt now .. the crackdiwn is now for the last month if you lookup the news surrounding this youll see encryption might become illegal
Wow I can’t believe I wasn’t subscribed to you because you are simply amazing 😘I’m going to binge watch your videos 😉
The jacuzzi is a channel ran by baph, baph was the admin to breached forums
so in other words its ran by someone who made a bad forum that got caught .
Hello John, I've tried it but it seems like I cannot access the leaksdb using the API: {"error":{"code":"FORBIDDEN","message":"You don't have permission to access the resource."}}. the scope is "scopes":["firework","authenticated"] I think I should have leaksdb also but I don't know how to do it...do you have any idea? thank you
Any Idea of flare pricing? Can’t stand apps that allow you a free trial with no mention of pricing. Clearly way too expensive 😢
I myself want to know the pricing too, as the prices are not on the site.
ahaha john saying "Is genesis still dead?" knowing well it is,but also wanting to showcase the "WEBSITE HAS BEEN SEIZED and "FBI" to dissuade any of beginners to get involved to cybercrime is really funny
Fun Busters Inc.
no, they never took the onion domain so it is but it isnt
I saw you on another channel. I wanted to see what you do. P gave you a great recommendation. You are awesome. Do not understand most of it, but enjoyed.
Thank you Mr. Hammond.
Im getting into cybersec now., so.i will be all ober your channel.
Nice to see some of these lesser seen exploits and private groups
I noted certain... used by... "certain police forces..." of certain "nation". Worst, now in this "nation" for certain crimes... is possible to use.
0:17 what is even reality, John
The real "cybercrime" is all the idiots losing money thinking they're buying hacks. A dude selling you a way to make money is making money from you
When everyone's digging for gold, sell shovels
Fascinating! Chilling but fascinating ❤
Damn UA-cam upped the price on premium, and started bombarding us with extra ads now. Anyways dope vid as usual.
Don't pay youtube.
DUDE... That's not the thumbnail! 😂
can we talk bout that "i love tax evasion" ? :D
13:11 me everytime I come to this channel
why does the thumbnail say "need FUD malware" though?
Hes apperently in need for fully un-detectable or (fud) malware 🙂
Amazing and cool stuff
so curious about that pegasus source you downloaded
dang this is finally getting coverage haha
Keyword was "some". That's crazy.
Is there any alternative of flare for personal use
half of the stuff in the chats does not work
what is flare
content on open/silver bullet config?
Seth Rogan could play you in a movie easily
Too bad these services are quite expensive. John, your channel is awesome but as of late the services you are promoting are out of most people’s reach
it is for education of cybersecurity professionals that have money not for broke wannabe black hat script kiddies
a job makes someone a professional ? @@myname-mz3lo
Your videos content is really interessant .
6:59 what browser is that?!
brave browser
Brave
Brave :D
@@MyurrDurr The one that got caught hijacking referral links and scamming its users :D
@JH - Like...be afraid... Be very afraid. In any case, another eye-opening, thought-provoking vlog. Thank you.
my friend this is normal
Nice video
that's scary
Point3 escalate is dead isn’t it?
What is this my position
Most of them are scammer
Please do more of this
come into john hammond
Nice :D
come to jaccuzi
Hi John,
that language is Russian)
Hi there from sept 2024
"Do you think that MacBook Pro is suitable for students majoring in cybersecurity? I am about to start studying this major in university and I want to know your opinion on whether this device meets the needs of students in this field.
Is this a legit question? Let's pretend that it is. That all depends on what you plan on doing with said MacBook Pro. Taking notes? Checking emails? Watching UA-cam vids while watching virtual lectures? Playing games on Steam? Running a VM with Windows 11 on it? Of course if you're "LeEt" you'll have a Kali Linux VM too. If you need more resources you can always upgrade.... Oops, Apple, nvm. Should be fine.
Uh not many things you'll be doing in cyber-security will not require huge computer hardware resources... honestly learning s lot of cyber-sec you should be learning Linux, like kali or Parrot, or a more normal linux OS and install the tools you need.
You can install linux on even kinda old laptops and it should run smooth and fast.
Maybe running VMs might need good RAM because you'll be splitting up your laptop's resources to run multiple machines. and maybe if you're bruteforcing thru big lists of hashes... but most cyber-sec stuff doesnt need lotsa power. Ive been learning for a couple years on an old mid-tier laptop. Good internet speed is good.
Don't feel like you gotta dish out lotsa money to learn all this. Coding, web fundamentals, networking etc... nothing special needed man
honestly yes. they use zsh shell by default, and a lot of bsd utilities which will translate well over to linux distros you may use in the fufure (kali also uses zsh by default). No substitute for learning gnu utils on a linux vm though. Mac has a few decent vm softwares now, even for m1 chips. Also, a lot of tools you'll use are available with brew, so super easy to install them with out launching a vm.
Sorry to ask what channels are you in in tg? Am in cyber security info it does give great intel
It all scammer on they anyway
Off topic is Worldcoin real?
Same scam different buzzword
You are the man 😂 this shit tho h4r h4rrr. 🤷♂️
Hello
I am late sir 😞
VX-underground
Honey pot 🎉
Wow!
hi
It's known when you use a walled off pc 🤣
damn they on the sauce
Me n my boys been knew this since 2018
you probably been paying for stuff that you can learn to do for free like a script kiddie since 2018 then ..
Dumpster diving😅
Mass
❤❤
Where the best legit credit card dump sites at
garfield
799 likes ❤❤❤
so funny ur feeling exposing undergrpound groups but you know what ur promoting thier groups so now extra people will join in that groups so dont promote any bad things to public bro hide it
i need to buy Good Quality Malware anyone out there .............;)
c:
lol nikto XD
A lot of these guys are fake😂
O.o
1